Select Page
The threat matrix for cloud-based Storage services. The matrix consists of the various attack techniques that pose threats to Storage resources.

Threat matrix for storage

The move to cloud is happening faster than ever before and organizations are increasing their dependency on cloud storage services. In fact, Microsoft Azure Storage services are one of the most popular services in the cloud. Companies need effective threat ... continue reading

What’s new with SQL Server Big Data Clusters—CU10 release

SQL Server Big Data Clusters is a new capability brought to market as part of the SQL Server 2019 release. Big Data Clusters extends SQL Server's analytical capabilities beyond in-database processing of transactional and analytical workloads by uniting the SQL ... continue reading
Microsoft Defender for Endpoint now supports Windows 10 on Arm devices

Microsoft Defender for Endpoint now supports Windows 10 on Arm devices

Today, we are excited to announce that Microsoft Defender for Endpoint support of Windows 10 on Arm devices is generally available. This expanded support is part of our continued efforts to extend Microsoft Defender for Endpoint capabilities across all the ... continue reading
Attack diagram showing stages of an attack and how the threat actor tracking model caught the initial stages so the affected organization could stop the attack

Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting

As seen in recent sophisticated cyberattacks, especially human-operated campaigns, it’s critical to not only detect an attack as early as possible but also to rapidly determine the scope of the compromise and predict how it will progress. How an attack ... continue reading
Azure Security Centre Regulatory compliance

Deploy key design principles with enterprise-scale architecture

This post was co-authored by Sarah Lean, Senior Content Engineer, Azure Tailwind Traders1 is a retail company that is looking to adopt Azure as part of its IT strategy. The IT team is familiar with deploying infrastructure on premises and ... continue reading
New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

New Security Signals study shows firmware attacks on the rise; here’s how Microsoft is working to help eliminate this entire class of threats

Cybersecurity threats are always evolving, and today we’re seeing a new wave of advanced attacks targeting areas of computing that don’t have the protection of the cloud. New data shows that firmware attacks are on the rise, and businesses aren’t ... continue reading
Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Microsoft continues to monitor and investigate attacks exploiting the recent on-premises Exchange Server vulnerabilities. These attacks are now performed by multiple threat actors ranging from financially motivated cybercriminals to state-sponsored groups. To help customers who are not able to immediately ... continue reading

SecretManagement and SecretStore are Generally Available

We are excited to announce two modules are now generally available on the PowerShell Gallery: Microsoft.PowerShell.SecretManagement Microsoft.PowerShell.SecretStore To install the modules, open any PowerShell console and run: Install-Module Microsoft.PowerShell.SecretManagement, Microsoft.PowerShell.SecretStore Introducing SecretManagement The SecretManagement module helps users manage secrets by ... continue reading
Customer datacenter

Perform at-scale, agentless SQL Server discovery and assessment with Azure Migrate

Moving on-premises infrastructure, databases, and applications to Azure is key to the success of your cloud migration and modernization journey, and we are committed to simplifying that process. With each major milestone, we set out to make these primary migration ... continue reading
Diagram for delivering a continuum of compute from cloud to edge

Do more for the National Security mission with Azure

As we continue to deliver on our commitment to providing the broadest range of commercial innovation for government, we’re rapidly advancing new capabilities for the National Security mission. Azure helps mission teams gain insight from data—at any security level—anywhere. For ... continue reading